General

  • Target

    2b0eb6d05a82cd92abe505b3ecbd3eb1d8553b279028b6bd9c219fd2a51e58a4N

  • Size

    952KB

  • Sample

    240918-3b77xsyejj

  • MD5

    d4aa88fa403c252e4852593705b22410

  • SHA1

    550e8b8dbcdf362c9845cd928fdcf4b584857f82

  • SHA256

    2b0eb6d05a82cd92abe505b3ecbd3eb1d8553b279028b6bd9c219fd2a51e58a4

  • SHA512

    e365fb2779738a7dbd422c2f89766711fcaf2226a2111af092c2841789e4937ac1ae6f465631ece0321ef20d40d241b0c245e1da9b85fd8b0746203d9df52283

  • SSDEEP

    24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5d:Rh+ZkldDPK8YaKjd

Malware Config

Extracted

Family

revengerat

Botnet

Marzo26

C2

marzorevenger.duckdns.org:4230

Mutex

RV_MUTEX-PiGGjjtnxDpn

Targets

    • Target

      2b0eb6d05a82cd92abe505b3ecbd3eb1d8553b279028b6bd9c219fd2a51e58a4N

    • Size

      952KB

    • MD5

      d4aa88fa403c252e4852593705b22410

    • SHA1

      550e8b8dbcdf362c9845cd928fdcf4b584857f82

    • SHA256

      2b0eb6d05a82cd92abe505b3ecbd3eb1d8553b279028b6bd9c219fd2a51e58a4

    • SHA512

      e365fb2779738a7dbd422c2f89766711fcaf2226a2111af092c2841789e4937ac1ae6f465631ece0321ef20d40d241b0c245e1da9b85fd8b0746203d9df52283

    • SSDEEP

      24576:2AHnh+eWsN3skA4RV1HDm2KXMmHaKZT5d:Rh+ZkldDPK8YaKjd

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • Drops startup file

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks